The role of Threat Intelligence Feeds in the Battle Against Evolving Cybercrime

Today, advanced cyber threats form part of the risk landscape we encounter every day in our increasingly digital lives. Cybercrime is known for its complex, chameleon characteristics – it’s a highly lucrative industry with fast-paced innovation at its core. The evolution of cybercriminal techniques enables it to thrive, and we need to sprint to keep up. Organizations must respond with security solutions nimble enough to compete with the bad guys. Sounds like a job for MRTI, and we think we’ve got just the ticket.

This webinar intends to be an educational piece for any Security team in need of having a better understanding of the value provided by Threat Intelligence feed in order to complement traditional security real estate. This is not intended for those who already have a strong expertise and understanding of the fundamentals of threat intelligence delivered via a feed.

Colin Whittaker, with Sam Abadir, Lockpath; and speakers from Lynx Technology Partners and Recorded Future.

In an age where cybersecurity threats are an everyday fact of life, organizations are looking for solutions that enable them to predict, prepare and react to the shifting landscape of cyber threats, and implementation of adaptive cyber security strategies is becoming inevitable to achieve that goal.

Adaptive cyber security methods allow for the simultaneous defense of multiple attack surfaces against this new wave of advanced cyber attacks targeting businesses and services. The NIST Cybersecurity Framework enables organizations — regardless of size, degree of cybersecurity risk, or cybersecurity sophistication — to apply the principles and best practices of risk management to improving security. Attend this CPE webinar to gain insights on:

- Getting a clear picture of the current health of your organizations' defenses
- Defining your security road map using NIST CSF as a framework
- Conducting gap analysis and executing remediation actions
- Mapping the NIST CSF with security controls and built-in reporting templates that align with the framework.

Today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. With large-scale data breaches continuing to make the headlines in 2018, organizations must be proactive, not reactive, in the face of looming cyber threats. Proactive threat intelligence can enable organizations to prevent breaches or compromises before they occur.

On this webinar our panel of experts will discuss some critical actions organisations can consider to prevent a data breach, and attendees will learn:

- Strategies you can implement now to help you protect against a breach.
- Best practices for gathering the intelligence to predict and prevent attacks.
- How to use threat intelligence to improve your organization’s security posture and reduce the risk of an attack.
- Steps to fortify your last line of defense.

No organization’s suite of business applications is static, especially for businesses that have committed to non-stop innovation. It is not uncommon for businesses to integrate only their high-impact applications with their existing identity and access management (IAM) systems. This can cause a huge surge in manual work, and oftentimes enterprises dedicate hundreds of human agents to manage accounts, adding more as new business applications are added. Enterprises can sidestep significant costs, increase efficiency, manage risk and deliver undiscovered value, by properly leveraging automation technologies across IAM systems.

Robotic process automation (RPA) is a powerful technology that harmonizes different systems across an organization’s environment, reduces human errors, provides 24/7 operations, and relieves employees from repetitive tasks so they can focus on more valuable activities. For example, data quality management in the risk and compliance processs has been a traditional pain area for many institutions, as it is very time consuming and manual. However, a cognitive RPA solution which combines machine learning capabilities can enable fast automated remediation of data quality issues, and the system can learn from the final decisions taken by the data analyst as well. Attend this CPE webinar for insights on:

- Getting started with an access management program.
- Evaluating the right configuration and system-based tools to automate processes at a task level, and align to your process automation strategy.
- Leveraging advanced analytics in risk management, compliance, and continuous monitoring programs.
- Embedding governance, risk management, and controls into your enterprise’s mobilization and deployment of RPA, so you can catch issues before they arise.

Cybercrime has evolved from random activities being carried out by individuals into a billion dollar illegal industry that continues to grow. How is cybersecurity keeping up with the rise of cybercrime?

Join this panel of security experts to learn more about:
- Trends in cybercrime and lessons learned in 2018
- The cost of data breaches
- Rise of cryptojacking and ransomware
- Who are the players who make up the world of cybercrime (e.g. programmers, distributors, fraudsters, etc.)
- The CISO vs the cybercriminal
- Best practices for protecting your business

Small and medium-sized businesses are major targets for cybercriminals. To stay safe, today’s businesses must understand the different types of cyberattacks they may encounter and implement strong cybersecurity practices.

Register for this 30-minute webinar on the key threats businesses faced this year and what's upcoming in 2019 to get details and tips that will help you keep your business and clients safe. Our Threat expert will be discussing ransomware, banking Trojans, phishing and all the crypto-crime that’s wreaking havoc on IT pros.

"In the age of breaches, enterprises are looking to understand the security and compliance risks associated with data stored in, and accesible from, cloud applications so they can better prepare should the unthinkable happen. With data and workloads moving to the cloud, securing the enterprise is more critical than ever.

Join cloud, security and compliance experts as they discuss:
- How to proactively analyze security risk from the business perspective
- What you need to know about your data, and how to ensure it is compliant when in the cloud
- How to automate security policy changes
- Top challenges for CISOs and CIOs
- Achieving security and compliance across multiple clouds
- Steps to take today"

With cyber attacks and breaches on the rise, cyber resilience is becoming an area of focus for C-suite executives worldwide. It is no longer a question of "if" a breach will occur, but "when," and organizations are looking to include cyber resilience as part of their business continuity and disaster recovery programs.

Join security and business continuity experts as they review:
- Threats to cyber resilience and business continuity
- Lessons from Wannacry (ransomware) and NotPetya (wiper) attacks
- Attack trends and business preparedness
- Steps for enterprises to take today

According to a recent study, having a lack of influence in the boardroom is a key reason why 84% of CISOs in North America believe there is no way to avoid a data breach. How are CISOs addressing the ever-growing cyber threat landscape, disappearing security perimeter and the chronic lack of skilled security professionals? What do they need to communicate and how, to get the board on their side?

Join security experts across the industry for an interactive discussion on:
- What keeps CISOs up at night
- Strategies for breach prevention
- Strategies for making the most of AI technolofy and human talent
- Coping with analyst fatugue
- Threats on the horizon
- Recommendations for strengthening security

The Internet of Things is set to reach 50 billion connected devices by 2020, according to a recent Cisco report, making them an attractive target for cyber criminals who can easily use them get inside networks of organizations worldwide. Once in, attackers can easily take over and control IP-enabled devices to extract data or implant malicious code.

Cyber threats continue to rise as organizations are embarking on their digital transformation journeys. The continued rise in cyber attacks is a key concern for CISOs in their efforts to protect the enterprise from financially motivated cyber criminals, as well as insider threats.

Join security experts as they discuss:
- New on the threat landscape
- Notable cyber attack methods and strategies and how to protect against them
- Areas for improvement
- Solutions for network visibility, breach detection and response
- Recommendations for improving security and steps to take today

Everybody knows IoT is the wave of the future. But what are successful organizations doing differently when it comes to their IoT initiatives? Are they saving more? Generating new revenue and lines of business? Or increasing operational efficiency and other metrics?

This webinar unveils the secrets of top-performing companies when it comes to IoT initiatives. You'll learn how they plan for, design, secure, and operate their IoT initiatives--and how they track the benefits.

With large-scale data breaches continuing to make the headlines in 2018, Today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. Cyberattacks that target and infiltrate critical infrastructure are very real and for the United States, it’s not a matter of if, but when.

Keeping your company secure is as much about detecting and responding to attacks as they occur as it is about preventing attacks before they happen. On this webinar our panel of experts will discuss THE critical actions organisations should consider to prepare for and survive any subsequent breach that may happen, and attendees will learn how to:

- Implement security analytics for incident detection and response.
- Quickly determine the extent of a compromise once a breach is detected, and understand the steps necessary to contain the affected systems.
- Leverage AI to autonomously respond to emerging threats before they can do serious damage.
- Understand key information that needs to be communicated to various stakeholders in the event of a breach.
- Apply a “standard of due care” in order to prove compliance to regulatory agencies.

Bogdan Botezatu, Director of Threat Research and Reporting, Bitdefender

What threats can we expect to see in 2019, and how do we make sure we're prepared?

Join Bitdefender Director of Threat Research and Reporting, Bogdan Botezatu to discuss research-based predictions on the biggest threats of 2019. He'll walk through the future of cryptojacking, advanced persistent threats (APTs), network-level exploits, IoT attacks, and others and provide recommendations on the industry's best defenses against these threats.

The biggest threat to any organization is it’s own people, particularly when they have access to its most sensitive data. This talk is about limiting the internal threat through RBAC and segregation of duties, and how to implement these using Active Directory.

Helen has a masters in electronic engineering, specializing in machine learning. She moved into Cyber Security at 10x Future Technologies, a fintech start up founded by the ex-CEO of Barclays Anthony Jenkins. She is now working with 6point6 to provide SME services to HM Government, designing and building a number of Cyber Security tools.

Learn how the role of Chief Information Security Officer (CISO) has changed in the age of data breaches and high-profile cyber attacks.

Join well-known CISOs at the top of their game for an interactive discussion on:
- How the role of CISO has changed in the last few years
- Hiring and retaining a CISO
- Top challenges for CISOs
- Dealing with stress & pressure associated with the role
- How to keep your security team happy
- Tools, technology and policies CISOs swear by
- What keeps CISOs up at night
- Why leadership buy-in is essential to boost cybersecurity
- Future trends and predictions

Every organization has a strategy – sometimes this is explicitly stated within various organizational documents and other times the strategic objectives are held within the minds of executive leadership. CISOs today are struggling to find the right words and narrative to set the tone from the top. How do you properly extract the right type of information from your organization that will help you build a consensus and influence with your top-level management?

As a CISOs, you need to acquire a new set of skills while maintaining your technical trench warfare knowledge (Frameworks, SIEMs, DLP, MDR, etc..). In this presentation, Max Aulakh (CEO) will present broad range of skills that are needed for the next CISO. We will also examine behaviors of some of the well known CISOs in our industry and how they interact & build influence to gain consensus.

Data breaches are on the rise and getting their fair share of media attention. It is no longer a question of "if", but "when" an organization will get breached. So, how are organizations preparing for the inevitable?

Join this roundtable discussion with security experts to learn more about:
- Trends in cyber attacks and breaches and what's at risk
- Prevention best practices
- Solution recommendations for breach detection and response
- Key factors for CISO success
- What's on the horizon for 2019

Start the new year on the right foot by investing in yourself and improving your leadership skills. Join Glenn Richardson, coach and executive consultant, in this webinar that will explore the principles of leadership. We will review practical tips, supported by real-world examples, from an experienced, successful leader who specializes in coaching and developing new and emerging leaders. Gain confidence in your ability to learn and lead, and, if you’re already in a leadership role or approaching a new position with leadership expectations - congratulations! Join us on this webinar to develop a plan for continue learning, improvement and career advancement.

This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

You are confirmed to attend for free on BrightTALK!
Save to your calendar to make sure you don't miss the live event

The role of Threat Intelligence Feeds in the Battle Against Evolving CybercrimeNahim Fazal, Head of Cybersecurity Development at ‎Blueliv[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]44 mins